Search Word(s) in Title, Keywords, Authors, and Abstract: HASH

Multicast Tree Construction with User-Experienced Quality for Multimedia Mobile Networks
Hoejung Jung and Namgi Kim
Page: 546~558, Vol. 13, No.3, 2017

Keywords: GTM, Mobile Network, Multicast Tree Construction, SDN
Show / Hide Abstract

Cyberbullying and a Mobile Game App? An Initial Perspective on an Alternative Solution
Manmeet Mahinderjit Singh, Ping Jie Ng, Kar Ming Yap, Mohd Heikal Husin and Nurul Hashimah Ahamed Hassain Malim
Page: 559~572, Vol. 13, No.3, 2017

Keywords: Cyberbullying, Digital Etiquette, Intrusion Detection System, Mobile Application, Social Network
Show / Hide Abstract

Geohashed Spatial Index Method for a Location-Aware WBAN Data Monitoring System Based on NoSQL
Yan Li, Dongho Kim and Byeong-Seok Shin
Page: 263~274, Vol. 12, No.2, 2016

Keywords: Location-Aware, NoSQL Database System, WBAN Monitoring System
Show / Hide Abstract

Practical (Second) Preimage Attacks on the TCS_SHA-3 Family of Cryptographic Hash Functions
Gautham Sekar and Soumyadeep Bhattacharya
Page: 310~312, Vol. 12, No.2, 2016

Keywords: Cryptanalysis, Hash Function, (Second) Preimage Attack
Show / Hide Abstract

Accelerating Group Fusion for Ligand-Based Virtual Screening on Multi-core and Many-core Platforms
Mohd-Norhadri Mohd-Hilmi, Marwah Haitham Al-Laila and Nurul Hashimah Ahamed Hassain Malim
Page: 724~740, Vol. 12, No.4, 2016

Keywords: Chemoinformatics, Graphical Processing Unit, Group Fusion, Open Multiprocessing, Virtual Screening
Show / Hide Abstract

Improving the Diffusion of the Stream Cipher Salsa20 by Employing a Chaotic Logistic Map
Mishal Almazrooie, Azman Samsudin and Manmeet Mahinderjit Singh
Page: 310~324, Vol. 11, No.2, 2015

Keywords: Chaos Theory, Cryptography, Differential Attacks, Hash Function, Logistic Map, Salsa20, Stream Cipher
Show / Hide Abstract

Cost-Effective Replication Schemes for Query Load Balancing in DHT-Based Peer-to-Peer File Searches
Qi Cao and Satoshi Fujita
Page: 628~645, Vol. 10, No.4, 2014
Keywords: DHT, Load Balancing, Load Reduction, Multi-Keyword Search, Replication
Show / Hide Abstract

An Improved Fast and Secure Hash Algorithm
Siddharth Agarwal, Abhinav Rungta, R.Padmavathy, Mayank Shankar and Nipun Rajan
Page: 119~132, Vol. 8, No.1, 2012
Keywords: SHA-256, SFHA-256, Improved SFHA-256
Show / Hide Abstract

Efficient Proof of Vote Validity Without Honest-Verifier Assumption in Homomorphic E-Voting
Kun Peng
Page: 549~560, Vol. 7, No.3, 2011
Keywords: Efficient Proof, E-Voting
Show / Hide Abstract

A Model Comparison for Spatiotemporal Data in Ubiquitous Environments: A Case Study
Seo-Young Noh and Shashi K. Gadia
Page: 635~652, Vol. 7, No.4, 2011
Keywords: Parametric Data Model, Model Comparison, ParaSQL, Spatiotemporal Data
Show / Hide Abstract

Security Properties of Domain Extenders for Cryptographic Hash Functions
Elena Andreeva, Bart Mennink and Bart Preneel
Page: 453~480, Vol. 6, No.4, 2010
Keywords: Hash Functions, Domain Extenders, Security Properties
Show / Hide Abstract

A Scalable Wireless Body Area Network for Bio-Telemetry
Adnan Saeed, Miad Faezipour, Mehrdad Nourani, Subhash Banerjee, Gil Lee, Gopal Gupta and Lakshman Tamil
Page: 77~86, Vol. 5, No.2, 2009
Keywords: Body Area Network, Plug-and-Play Biosensors, Telemedicine, Ubiquitous Computing, ECG Monitoring, ECG Feature Extraction
Show / Hide Abstract

Design of Cryptographic Hardware Architecture for Mobile Computing
Mooseop Kim, Youngsae Kim and Hyunsook Cho
Page: 187~196, Vol. 5, No.4, 2009
Keywords: Trusted Computing, MTM, Cryptographic circuit, RSA, HASH, Mobile Computing
Show / Hide Abstract